Ransomware belongs to the family of malware used to take control of users’ machines and the users get back control of the machine when the victim pays a ransom to the attackers.

There are a number of preventive steps that a user can take to avoid ransomware attack. But before delving depth into the ransomware prevention technique, you need to know a bit about types of ransomware and how they spread.

How does ransomware spread?

Your computer may get infected with ransomware in several ways such as via email attachment, via compromised website, Trojan horses, by clicking pop up ads, etc. [Read more…]

Though malware may take many forms, they have only one purpose to -disturb your computing environment. We can broadly classify malware depending on how the replicate and function. Remember that any codes that have evil intentions can be called a malware. That is why a virus, worm or even a backdoor program can be considered as a malware. But there is a distinct difference between a malware and an exploit that we will discuss in another post. [Read more…]

Advanced malwares are extremely stealthy and attack targeted protocols and applications. In most cases, the attackers use these malwares to steal sensitive information from the governmental institutes financial institutes, especially the credit card service providers .

Major Concerns about Advanced Malware:

They are discovered after the attack has been taken place. So, you do not have a clue what is going on with your sensitive data unless you detect the presence of advanced malware in your system. When you are planning against advanced malware your primary target should be detect it as soon as possible. By using Garter’s 5 styles of advanced defence framework, you can apply the following five defence mechanism in your network:

Syras is a telecommunication and IT security professional with over 10 years of experience in this field. He has been running his personal blog Securitywing.com since 2010. He has the following certifications:

CISA(Certified Information Systems Auditor)

CCNP(Cisco Certified Network Professional)

Prince2( Project Management)

Machine Learning

Copyrights

Securitywing.com reserves the copyrights of all of its published articles.No contents of this site is permitted to be published to anywhere else in the Internet.If any contents are found in any other websites, securitywing reserves the rights to file a DMCA complaint.
But you have the right to use the link of any relevant article of this site to point from your website if you consider that it might improve the quality of your article.